You are on page 1of 80

CS605-Software

Engineering-II
(Solved Macq’s)
LECTURE FROM
(23 to 45)
Junaidfazal08@gmail.com FOR MORE VISIT JUNAID MALIK
Bc190202640@vu.edu.pk
VULMSHELP.COME 0304-1659294
Question No: 1
_ is defined as the probability of failure free operation of a
computer program in a specified environment for a specified time.
► Software Reliability
► Software Usability
► Software Integrity
► Software Efficiency

Question No: 2
Schedule Performance Index SPI) is equal to
► BCWP / BCWS
► BCWP * BCWS
► BCWP + BCWS
► BCWP - BCWS

Question No: 3
The two objectives of a are to identify problem areas within the
work product and a checklist of action items.
► Review Issue List
► Formal Technical Reviews
► Informal Technical Reviews
► Testing
Question No: 4
It is noted that a/an _ _ review can be worse then no review at
all
AL-JUNAID TECH INSTITUTE
► Uncontrolled
► Controlled
► Intermediate
► Normal
Question No: 5
The Review participants SHOULD NOT be focused on .
► Weaknesses of the developer
► Time Lines
► Review agenda
► Work product

Question No: 6
The progress on a project at any given point in time can be calculated
by:
► Adding all the BCWS till that point for all tasks
► Multiplying all the BCWS till That point for all task
► Adding BCWS and EVA for all task still that point
► Dividing all the BCWS till That point for al tasks

Question No: 7
Milestone represents:
► The defined target which you need to achieve
► A predictable risk that may hit the project
► An unpredictable risk that may project
► The Loss that organization may suffer due to risk
AL-JUNAID TECH INSTITUTE
Question No: 8
If an error related to requirements is identified in testing phase, error
will be considered an error of _ _ phase.
► Requirement
► Design
► Code
► Testing

Question No: 9
_ _ involves rework, repair, and failure mode analysis of the
product.
► Internal Failure Cost
► External Failure Cost
► Appraisal Cost
► Prevention Cost

Question No: 10
If:
E = Errors found before shipment
D = Errors found during operation
Then Defect Removal Efficiency (DRE) is equal to:
► DRE = E = / (E+D)
► DRE = E = * (E+D)
► DRE = E = + (E+D)
► DRE = E = - (E+D)
Question No: 11
BCWS is term used in Eamed Value Analysis it stands for .
AL-JUNAID TECH INSTITUTE
► Budgeted Cost of Work Schedule
► Budgeted Cost of Whole System
► Beginning Cost of Whole System
► None of the given options
Question No: 12
_ states that 80% of the defects can be traced to 20% of its causes.
► Pareto Principle
► Fred Brooks Principle
► Kraul Principle
► D.Streeter Principle

Question No: 13
The basis principle for a review is that the focus should be on the
_ ..
► Product and not the producer
► producer and not the Product
► Profit to be gained
► Presentation Slide

Question No: 14
Many defect identified in few components at design level testing/review,
a software development team should .
► Allocate good and extra resources at coding level to review these
components thoroughly
► Good achievement by designing team
► No need to allocated further resources at coding level to review these
components
AL-JUNAID TECH INSTITUTE
► Mission accomplished once good number of error/flaws identified level

Question No: 15
Milestone represents:
► The defined target which you need to achieve
► A predicable risk that may hit the project
► A unpredictable risk that may hit the project
► The Loss that organization may suffer due to risk
Question No: 16
_ a statistical technique is used to develop an overall indication of
improvement in software quality.
► Error index
► Pareto Principle
► Quality Assurance
► Cost of Quality
Question No: 17
A model where Some errors are passed through to the next stem
undebated such errors are said to have been .
► Amplified
► Reduced
► Neutralized
► Multiplexed
Question No: 18
Earned Value Analysis (EVA) is a technique for
assessing the progess of a project.
AL-JUNAID TECH INSTITUTE
► Quantitative
► Subjective
► Qualitative
► Descriptive

Question No: 19
It is noted that a/an _ _ review can be worse than no review at all.
► Uncontrolled
► Controlled
► Intermediate
► Normal
Question No: 20
FTR is a quality control activity performed by software enginers.it
stands for:
► Formal Technical Review
► Formatted Technical Review
► Feasibility of Technical Requirement
► Fetched Technical Requirement

Question No: 21
Earned Value analysis (EVA) is a technique for assessing the progress of a
project

► quantitate
► Subjective
► Descriptive
► Qualitatives
AL-JUNAID TECH INSTITUTE
Question No: 22

BCWS for a task i will be equal to:


 Risks appeared in task i
 Effort (person-days etc) for task i
 Resource deficiency for task i
 None of the given options
Question No: 23
SQA is an umbrella activity in which following activities are performed
EXCEPT
 Review
 Testing
 Project Planning
 Inspection
Question No: 24
Schedule Performance Index (SPI) is equal to
 BCWP / BCWS
 BCWP * BCWS
 BCWP + BCWS
 BCWP – BCWS
Question No 25
Poka Yoke is the name of a
 QA technique
 Japanese dish
 Idiom
 None of the given options
Question No 26
is one of the techniques to prepare project schedule once we have
defined "task network"
 Program evaluation and review techniques (PERT)
 Critical Communication path method (CCPM)
 System resource negotiation method (SRNM)
 Strategic Schedule Development technique (SSDT)
AL-JUNAID TECH INSTITUTE
Question No 27
Quality cost may be divided into costs associated with:
 Prevention, appraisal and failure
 Customers, developers and maintenance
 Builds, releases and products
 Bugs, errors and Reports
Question No 28
The equation to find out the Availability of software is:
 Availability = (MTTF x MTBF) / 100
 Availability = (MTTF / MTBF) x 100
 Availability = (MTTF + MTBF) x 100
 Availability = (MTTF - MTBF) x 100
Question No 29
FTR stands for:
 Feasibility of technical requirement
 Fetched Technical Requirement
 Formal Technical Review
 None of the given options
Question No: 30
Earned Value Analysis (EVA) is a _ _ technique for assessing the
progress of a project.
 Qualitative
 Quantitative
 Subjective
 None of the given options

Question No: 31
FTR stands for:

 Feasibility of technical requirement


 Fetched Technical Requirement
 Formal Technical Review
 None
AL-JUNAID TECH INSTITUTE
Question No: 32
Configuration Auditing deals with:

 Ensuring that Resources have been allocated properly.


 Ensuring that changes are implemented parallel with SDLC framework
activities.
 Ensuring that the changes have been implemented properly
 All of the given

Question No: 33
Poka-Yoke is the name of a:

 QA technique
 Japanese dish
 Idiom
 None
Question No: 34
Quality cost may be divided into costs associated with:

 Prevention, appraisal, and failure


 Customers, developers, and maintenance
 Builds, releases, and products
 Bugs, errors, and Reports

Question No: 35
If an error related to requirements is identified in the testing phase, this error
will be considered as an error of

 Requirement
 Design
 Code
 Testing

Question No: 36
AL-JUNAID TECH INSTITUTE
In order to use the PERT and CPM, which one of the followings is NOT
required?

 Decomposition of tasks-also known as the work breakdown structure


(WBS).
 Teams communication mode details.
 Estimation of effort.
 Interdependencies.

Question No: 36
if:
E = Errors found before shipment
D = Errors found during shipment
Then Defect Removal Efficiency (DRE) is equal to:

 DRE = E + (E+D)
 DRE = E - (E+D)
 DRE = E * (E+D)
 DRE = E / (E+D)

Question No: 37
Following are effective guidelines for Review EXCEPT:

 We need to review the product, not the producer


 Be sensitive to personal egos
 Errors should be pointed out gently
 The tone should be high and strict

Question No: 38
The basic idea behind Software configuration management is:

 To manage and control the change


 To efficiently allocate the resources
 To properly manage status reporting
AL-JUNAID TECH INSTITUTE
 None

Question No: 39
Earned Value Analysis (EVA) is a _ technique for assessing the progress
of a project.

 Qualitative
 Quantitative
 Subjective
 None

Question No: 40
Quality cost may be delivered into costs associated with:
 Prevention, appraisal and failure
 Customers, developers and maintenance
 Builds, releases and products
 Bugs, errors and reports

Question No: 41
A Software Requirement Specification is traced if the of its requirements is clear.
 Quality
 Slandered
 Origin ✔
 None

Question No: 42
Version Control discusses about:
 How does an organization control changes before and after software is released
to a customer
 How the resources will be assigned to tasks in work breakdown structure (WBS) 
 How the test cases will be executed before deploying each release.
 All of given
Question No: 43
The implemented requirement has been through the selected approach, such as
testing or inspection.
 Verified
 Deleted
 Approved
AL-JUNAID TECH INSTITUTE
 None

Question No: 44
The Software reengineering is a activity.
 Code
 Out dated
 Document
 Non-trivial

Question No: 45
Which of the following is NOT an example of Software Configuration Item (SCI):
 Test Case
 Integration Plan
 Design specification
 None
Question No: 46
Mean Time Between Failure (MTBF) can be calculated by:
 MTBF = MTTF + MTTR
 MTBF = MTTF - MTTR
 MTBF = (MTTF/MTTR)*100
 MTBF = (MTTR/MTTF)*100

Question No: 47
software development is itself risky as changes to one part of the system
inevitably involve further changes to other components.
 Forward
 Reverse
 Old
 New

Question No: 48
Program is restructured the reverse engineering phase. In this case we modify
source code and data in order to make it amenable to future changes.
 After
 None
 Along with
 Before

Question No: 49
AL-JUNAID TECH INSTITUTE
Managers look at the system from the angle that does the system and associated
business process make an effective contribution to the business goal?
 Senior
 IT
 None
 Line

Question No: 50
user assess the system from the perspective of how effective do they find the
system in supporting their business processes and how much of the system
functionality is used.
 Senior
 IT
 Line
 End ✔

Question No: 51
A system is considered to be a legacy system if it has been in operation for years.
A legacy system has many components.
 Less than seven
 Many ✔
 More than two
 Less than ten

Question No: 52
Legacy system migration, however, is an easy task and there are a number of risks
involved that need to be mitigated
 Simple
 Crucial
 None
 Easy

Question No: 53
engineering does not simply create a modern equivalent of an older program,
rather new user and technology requirements are integrated into the reengineering
effort
 Forward
 None
 Reverse
 BPR
AL-JUNAID TECH INSTITUTE
Question No: 54
Which of the following the NOT one of the attributes of requirements.
 Requirement ID
 Creation Date
 Created By
 Received By

Question No: 55
If the version of a release changes from 1.0.0 to 2.0.0 what will you conclude about
new release (having version 2.0.0)
 There was no change in functionality
 There was major change in functionality
 There was partial change in functionality
 Bugs in previous functionality were removed

Question No: 56
Which of the following is NOT one of the tasks included in Software Configuration
Management.
 Version Control
 Configuration Auditing
 Test Case development
Change control

Question No: 57
are sometimes also knowns as walkthroughs or inspects
 Formal Technical review
 Testing
 Debugging
 Informal Technical review
Question No: 58
In order to use the PERT and CPM, which one of the following is not
required?
 Inerdependencies
 Estimation of effort
 Teams communication mode details
 Decomposition of tasks-also known as the work breakdown
structure(WBS)
AL-JUNAID TECH INSTITUTE
Question No: 59
A requirement related detected in any (design, source code testing) will
be called_
 Requirements defect
 Design related defects
 Source code defect
 Zero level defect

Question No: 60
Cost of quality increase as we go from
 Detection to preventation to Failure
 Preventation to Detection to Failure
 Failure to Preventation to Detection
 Detection to Failure to Preservation
Question No: 61
Then Defect Removal Efficiency (DRE) is equal to:
ANS: - DRE = E / (E+D)
Question No: 62
a statistical technique is used to develop an overall indication of improvement
in software quality.
ANS: - Error Index

Question No: 63
The two objectives of a are to identify problem areas within the work product
and a checklist of action items.
ANS: - Formal Technical Reviews

Question No: 64
states that 80% of the defects can be traced to 20% of its causes.
ANS: - Pareto Principle

Question No: 65
Work products used to track errors is/are _ during software development.
ANS: - Requirements specification, design document and source code
AL-JUNAID TECH INSTITUTE
Question No: 66
BCWP refers to:
ANS: - Budgeted cost of work performed so far

Question No: 67
Milestone represents:
ANS: - The defined target which you need to achieve

Question No: 68
Earned Value Analysis (EVA) is a technique for assessing the progress of a project.
ANS: - Quantitative

Question No: 69
FTR is a quality control activity performed by software engineers, it stands for:
ANS: - Formal Technical Review

Question No: 70
BCWS is a term used in Earned Value Analysis it stands for .
ANS: - Budgeted Cost of Work Schedule

Question No: 71
The degree of rigor in determining the set of tasks can be categorized as
caual,Quick Reaction, strict and_
 Uniform
 Unstructured
 Decomposed
 Structured

Question No: 72
if:
E = Errors found before shipment
D = Errors found during operation
Then Defect Removal Efficiency (DRE) is equal to:
 DRE = E / (E+D)
 DRE=E+(E+D
 DRE=E*+(E+D)
 DRE=E-(E+D)

Question No: 1
AL-JUNAID TECH INSTITUTE
A law affirming that to continue after a certain level of performance has been reached will result in a
decline in effectiveness. This law is know as

 Law of Diminishing returns


 Law of effectiveness
 Law of Saturation
 Law of Marketing returns

Question No: 2

is not the construction part of software development activities.

Requirement gathering

 Testing
 Configuration Management (Page 8)
 Coding

Question No: 3

Basic project management process are established at level of CMM

 Chaotic
 Initial
 Level 1
 Repeatable (Page 12)

Question No: 4

The projects usually don’t fail due to

 ambiguous/incomplete requirements
 changing customer requirements
 the fact that company was not CMM certified (Page 28 - 29)
 failure in project management

Question No: 5 is a team organization where there is no permanent leader


and task coordinators are appointed for short duration. Decisions on problems and approach are made
by group consensus and communication among team is horizontal.

 Democratic decentralized (DD) (Page 32)


 Controlled decentralized (CD)
 Synchronous paradigm (SP)
 Controlled centralized (CC)
AL-JUNAID TECH INSTITUTE
Question No: 6

Which of these is not a valid reason for measuring software processes, products, and resources?

 to price them
 to improve them
 to characterize them
 to evaluate them

Question No: 7 Integrity can be measured by the following formula

 integrity= (1-threat) x (1-security)


 integrity= ∑ (1+threat) + (1-security)
 integrity= ∑[(1-threat) x (1-security)] (Page 69)
 integrity= ∑ (1-threat) - (1-security)

Question No: 8

The rapid application development model is

 Another name for component-based development.


 A useful approach when a customer cannot define requirements clearly
 A high speed adaptation of the linear sequential model. (Page 19)
 All of the given

Question No: 9 An is a user identifiable group of logically related data or control


information maintained within the boundary of the application

 Internal logical file (ILF) (Page 42)


 External Interface file (EIF)
 External input
 External Query

Question No: 10

When more than one user interpret the same requirement in different ways then we can say that the
requirements are

 None of the given


 Incomplete
 Ambiguous
 Incorrect

Question No: 11

Testing and Software Quality Assurance activities are exactly similar activities with different names
AL-JUNAID TECH INSTITUTE
 True
 False (Page 69)

Question No: 12

If an error related to requirements is identified in testing phase, so this error will be considered as an
error in phase.

 Design
 Code
 Requirement
 Testing

Question No: 13

Usually the performance of the organization change over-night.

 True
 False

Question No: 14

Following are the implicit requirement(s) of software?

 Efficiency
 Ease of use
 Maintainability
 All of the given (Page 106)

Question No: 15

If an error related to requirements is identified in Coding, so this error will be considered as an error in
phase.

 Design
 Code
 Requirement
 Testing

Question No: 16

While developing the software if the bug is caught then it is termed as

 Error
 Defect
 Fault
 Mistake
AL-JUNAID TECH INSTITUTE
Question No: 17

Following are the types of Formal Technical Reviews except

 Inspection
 JAD (Page 110)
 Walkthrough

Question No: 18

The Review participants should not focus on

 Work product
 Weaknesses of the developer (Page 113)
 Time lines
 Review agenda

Question No: 19

Review meeting is attended by the following except

 Review leader
 All reviewers
 CEO (Page 112)
 Product Producer

Question No: 20

Which statement is true in the light of Pareto principle?

 80% of defects are caused by 20 % of mistakes (Page 114)


 20% of defects are caused by 80 % of mistakes

Question No: 21

Reliability and Safety are same concepts with respect to software quality

 True (Page 117)


 False

Question No: 22

The prevention of defects being injected into the software can help in decreasing the cost of software.

 True
 False

Question No: 23
AL-JUNAID TECH INSTITUTE
Poka Yoke is the name of a

 Japanese dish
 QA technique (Page 118)
 Idiom
 None of the given

Question No: 24

If a new version of a product is released by fixing the bugs in the previous release then it is termed as

 Product Update (Page 122)


 Product Upgrade
 Defect Removal
 Product Performance

Question No: 25

The Evolution Graph signifies the

 version relationship (SE-PRESSMAN, page 260)


 baseline of a particular release
 change control activity
 all of the given

Question No: 26

In the software development life cycle, soon the defect is detected will results in

 increase in cost of software


 decrease in software cost
 both a and b are correct

Question No: 27

testing verifies the correct implementation of internal units, structures and relationship
among them.

 Black box
 White box
 Gray box

Question No: 28

The template for organizing SRS given by American Department of Defense and NASA should be used for
AL-JUNAID TECH INSTITUTE
 none of the given
 large and complex projects
 small project
 medium size projects

Question No: 29

If you know the relationship between the use cases, classes, GUIs, Test cases and other artifacts then we
can say that requirements are traceable in that project.

 True
 False (Page 133)

Question No: 30

There may be one or more GUIs that are part of any good software but may not satisfy any requirement

 True
 Fals

Question No: 31

Following are the components of a Legacy system except:

 business processes
 system hardware
 marketing (Page 134)
 application software

Question No: 32

There are many reasons for which the legacy system become difficult to maintain EXCEPT

 Language in which system was developed become obsolete


 lack of consistency as different parts of the system have been developed by different teams
 None of these
 No documentation is available (Page 134)

Question No: 33 In , new user and technology requirement can also be integrated
into the re-engineering effort.

 Backward re-engineering
 Forward re-engineering (Page 140)
 Business Engineering
 Business Process Engineering

Question No: 34
AL-JUNAID TECH INSTITUTE
Large classes reduces

 Cohesion (Page 143)


 Coupling
 Consistency
 Chains

Question No: 35

Level is the lowest capability level of CMMI in Continuous representation

 1
 (Page 169)
 5
 6

Question No: 36

In representation of CMMI model, consideration is given to improve selected processes


areas.

 Staged (Page 169)


 Continuous

Question No: 37

Empirical models are statistical models and are based upon historic data

 True (Page 81)


 False

Question No: 38

Error tracking provides a quantitative means of assessing the quality of the individuals implementing a
software product.

 True
 False

Question No: 39

There are tools available in the market for project tracking. These tools can automatically track and
manage the project replacing the need of any human being as a Project Manager.

 True
 False

Question No: 40
AL-JUNAID TECH INSTITUTE
Two tools for computing critical path and project completion times from activity networks are

 CPM and PERT (Page 100)


 DRE and SQA
 FP and LOC
 ASD and BS

Question No: 41

In order to measure the design quality, if the frequency of ripple defects is too large, then it means that
there is tight coupling and hence the

 design is maintainable
 design is not maintainable (Page 79)
 design has completed
 none of the given

Question No:42 , there is both vertical and horizontal communication.

 Controlled decentralized (CD) Page 32


Democratic decentralized (DD)
Controlled centralized (CC)
Synchronous paradigm (SP)

Question No: 43

The only reason for an estimate to be unreliable is lack of experience related to the application on the
part of the estimator.

 true
 false

Question No: 44

A consideration of software scope must include an evaluation of all external interfaces.

 true (Page 80)


 false

Question No:45

Software quality is conformance to _

 Explicitly stated functional and non functionasl requirements (Page 106)


 Explicitly documented developement standrads
AL-JUNAID TECH INSTITUTE
 Implicit characteristics that all the professional software are expectd to have
 All of the given options

Question No: 46

_ Subgroups are those that the user has the option of using one or none of the subgroups
during an elementary process.

 Optional (Page 46)


 Mandatory
 None of the Given
 RET

Question No: 47

Process discipline is unlikely to be rigorous, but where it exists it may help to ensure that existing processes
are maintained during times of stress and this is done at CMM level ------ --.

 1
 4
 3
 2 (Page 172)

Question No: 48

Which one of the following activities does not belong to Risk Mitigation, Monitoring, and Management
Plan?

 Risk Projection (Page 89)


 Risk Mitigation
 Risk avoidance
 Risk Management and Contingency Planning

Question No: 49

Which one of the following principles/techniques is NOT software projects scheduling?

Interdependency identification

 Time allocation
 Effort validation
 Function point analysis (Page 93)
 Milestone definition

Question No: 50
AL-JUNAID TECH INSTITUTE
With a complex class you have to move data and methods around in small pieces to avoid errors, it seems
slow but it is the because you avoid debugging

 Quickest (Page 163)


 Problem
 None of the given
 Slowest

Question No: 51

The purpose of earned value analysis is to

 determine how to compensate developers based on their productivity


 provide a quantitative means of assessing software project progress (Page 102)
 provide a qualitative means of assessing software project progress
 set the price point for a software product based on development effort

Question No: 52

The RMMM plan assists the project team in developing strategy for dealing with risk. In this context, an
effective strategy must consider:

 Risk avoidance
 Risk monitoring
 Risk management and contingency plan
 All of the given choices (Page 89)

Question No: 53

The component based development model is

 only appropriate for computer hardware design.


 not able to support the development of reusable components.
 dependent on object technologies for support. (SE-PRESSMAN, 70)
 not cost effective by known quantifiable software metrics.

Question No: 54

Which is used to determine the most viable option for cost estimation when the information in
the “Decision tree” is complete.

 E = 3.2 (KLOC) 1.05


 Expected cost = (path probability)I x (estimated path cost) (Page 83)
 Expected cost = (path probability)I x (estimated path cost)
AL-JUNAID TECH INSTITUTE
Question No: 55

After building the Decision Tree, following formula is used to find the expected cost for an option.
Choose the correct formula:

 Expected Cost= (path probability)i * (estimated path cost) (Page 83)


 Expected Cost= (path probability)i / (estimated path cost)
 Expected Cost= (path probability)i + (estimated path cost)
 Expected Cost= (path probability)i - (estimated path cost)

Question No: 56

Degree of uncertainty that the product will meet its requirements and be fit for its intended use
is the

 Cost risks
 Schedule risks
 Performance risks (Page 87)
 None of the given choices

Question No: 57

Every task or group of tasks should be associated with a project --------- --.

 Schedule
 Member
 Manager
 Milestone (Page 93)

Question No: 58

Every task should be assigned to a specific team ---------- --.

 Member (Page 93)


 Manager
 Organizer
 None of the given

Question No: 59

Which one is not the Software project planning activity carried out by the project manager for
estimation?

 Software scope estimation


 Resources requirements
 Time requirements
 Product Quality (Page 80)
AL-JUNAID TECH INSTITUTE
Question No: 60

Configuration Item identification involves:

 Identifying the structure of the s/w system


 Uniquely identify individual components
 Uniquely identifying various revisions
 All of the given

Question No: 61

Incomplete Configuration identification documents may result in:

 Schedule Product
 all of the given choices are correct Click here for detail
 Defective Product
 Higher Maintenance Costs

Question No: 62

Degree of uncertainty that the product will meet its requirements and be fit for its intended use is the

 Cost risks
 Schedule risks
 Performance risks (Page 87)
 None of the given choices

Question No: 63

Proactive risk management philosophy is also some times termed as Indiana Jones school of risk
management

 true
 false (Page 84

Question No: 64

Software Availability can be calculated by the following equation

 Availability = (MTTR/MTTF) x 100


 Availability = (MTBF/MTTR) x 100
 Availability = (MTTF/MTBF) x 100 (Page 116)
 Availability = (MTBF/MTTF) x 100

Question No: 65
AL-JUNAID TECH INSTITUTE
Phase Index can be calculated by the help of the following formula, where

Ei – the total number of errors uncovered during the ith step in the SE process

Si – number of serious errors

Mi – number of moderate errors

Ti – number of minor errors

PSi – product size at the ith step

ws, wm, wt – weighting factors for serious, moderate, and minor errors

 PIi = ws(Si/Ei) + wm(Mi/Ei) + wt(Ti/Ei) (Page 115)


 PIi = ws(Si/Ei) + wm(Mi/Mi) + wt(Ti/T)
 PIi = ws(Si/Ei) + wm(Mi/Mi) + wt(Ti/Ei)
 PIi = ws(Si/S) + wm(Mi/M) + wt(Ti/E)

Question No: 66

The higher the Error Index, the higher will be the Defect Removal Efficiency

 True (Page 115)


 False

Question No: 67

The goal of quality assurance is to provide management with the data needed to determine which
software engineers are producing the most defects.

 true
 False

Question No: 68

From the following listed software development Model, which one is an object oriented model

 Classical life cycle model


 Fountain model (Page 23)
 Spiral model
 Waterfall model

Question No: 69

The prototyping model of software development is

 a reasonable approach when requirements are well defined.


AL-JUNAID TECH INSTITUTE
 A useful approach when a customer cannot define requirements clearly.
 the best approach to use for projects with large development teams.
 a risky model that rarely produces a meaningful product.

Question No: 70

Which one of the following does not belong to a strategy for dealing with risk?

 Risk avoidance
 Security risk assessment (Page 89)
 Risk monitoring
 Risk management and Contingency planning

Question No:71

A entity is the one which have any -----------in the problem domain without some other entity.


Strong, Role*
All of the given
Weak, Function
None of the Given (Page 47)

A weak entity is the one which does not have any role in the problem domain without some other entity

Question No: 72

ILF is a --------------- identifiable group of logically control informations ------------- the boundary of the
application.


user, within (Page 42)
user, without
All of the given
user, along

Question No: 73

Several entities are always created -------------- and deleted together then this is a strong indication that
they should be grouped into --------- logical file/files.
Together, Single (Page 48)
Together, Multiple
Together, Double
All of the given

Question No: 74
AL-JUNAID TECH INSTITUTE
Which of these software characteristics are used to determine the scope of a software project?

 context, lines of code, function


 context, function, communication requirements
 information objectives, function, performance (Page 34)
 communications requirements, performance, information objectives

Question No: 75

In a team is structured along a traditional hierarchy of authority

 closed paradigm (Page 32)


 synchronous paradigm
 random paradigm
 open paradigm

Question No: 76

Integrity means that the software should

 help the users to enjoy usability


 none of the given
 Withstand the attack from a hacker (Page 69)
help the hacker to hack the system

Question No: 77

Ambiguous requirements can be measured quantitatively

 False
 True (Page 71)

Question No: 78

The Spiral model of software development is of Iterative nature

 True
 false

Question No: 79

While performing risk analysis, the impact of risk can not be measured quantitatively

 True
 False

Question No: 80


AL-JUNAID TECH INSTITUTE
is the measure of how many defects are removed by the quality assurance processes before
the product is shipped for operatio

 Defect removal efficiency (Page 69)


 defect density
 None of These

Question No: 81

For software the total numbers of requirements are equal to _ .

 Functional requirements
 non-functional requirements
 Functional requirements and non-functional requirements (Page 71)
None of these

Question No: 82

The model is used to overcome issues related to understanding and capturing of user
requirements.

Rapid Prototyping (Page 17)


Water fall
Build and Fix
None of the above

Question No: 83

is not the part of software development loop.

 Status Quo
 Problem definition
 Technical development
 Task set (Page 10)

Question No: 84

The level 1 of CMM is known as

 Managed
 Defined
 Initial (Page 12)
 Repeatable

Question No: 85
AL-JUNAID TECH INSTITUTE
According to DeMarco a good Project Manger

 should be very nervous


 should be very strict in official matters
 should not ignore any mistake from his team members.
 should have a big heart and should ignore small mistakes (Page 31)

Question No: 86

The best project team organizational model to use when tackling extremely difficult problems is the

 chief programmer team model


 democratic decentralized model (Page 32)
controlled decentralized model
controlled centralized model

Question No: 87

Which factor is the least important when choosing the organizational structure for a software team?

 degree of communication desired


 predicted size of the resulting program
 rigidity of the delivery date
 size of the project budget (Page 32)

Question No: 88

Product and process decomposition occurs simultaneously as the project plan evolves

 True
 False

Question No: 89

Measuring the quality and performance of a software through any mean is much better than just
making a guess about it.

 True
 false

Question No: 90

is data that influences an elementary process of the application being counted.

 Elementary Process
 External Query
 External Output
AL-JUNAID TECH INSTITUTE
 Control Information (Page 43)

Question No: 91

An entity which defines many-to-many relationship between two or more entities is called

Associative Entity Type (Page 47)

 Attributive Entity Type


 Entity Subtype
 None of these

Question No: 92

Software risk impact assessment should focus on consequences affecting

 performance, support, cost, schedule


 planning, resources, cost, schedule
 marketability, cost, personnel
 business, technology, process

Question No: 93

The number of people required for a software project is determined

 after an estimate of the development effort is made.


 from an assessment of the technical complexity of the system.
 by the size of the project
 all of the given

Question No: 94

Defect Removal Efficiency (DRE) can be measured by where E is Errors found delivery and D is error
found after delivery (typically within the first year of operation)

 DRE= E/(E+D) (Page 69)


 DRE= E - (E+D)
 DRE= E * (E+D)
 None of the given

Question No: 95

In function point analysis technique EO stands for

 Export operation
 Export output
 External output (Page 49)
AL-JUNAID TECH INSTITUTE
 None of these

Question No: 96

In a team is structured loosely and depends on individual initiative of the team members

 Random paradigm (Page 32)


 closed paradigm
 synchronous paradigm
 open paradigm

Question No:97

is the first stage of waterfall lifecycle model

 Requirement definition (Page 15)


 Operation
 Unit testing
 Implementation

Question No: 98

is not the management part of software development activities.

 Coding pg#8
 Configuration Management
 Quality Assurance
 Project planning Question No: 99

Software process and product quality are controlled at _ .

 level 1
 initial level
 level-4 (Page 12)
 level-3

Question No: 100

QA is an activity performed of the software development.

 at the initial stage


 at the final stage
 throughout (Page 25)
 at the middle

Question No: 101


AL-JUNAID TECH INSTITUTE
the ability to encourage people to create and feel creative.

 Organization
 Motivation
 Innovation (Page 30)
 Managerial Identity

Question No: 102

Caper Jones divided software related activities into different categories.

 35
 40
 20
 25 (Page 7)

Question No: 103

By default every organization is working at _

 level 1 (Page 12)


 level 0
 level 3
 level 4

Question No: 104

Software Engineering is the set of and _ to develop software.

 languages , processes
 classes ,objects
 processes, tools (Page 4)
 tools, objects

Question No:105

Software has very close relationship with

 Biology
 Physics
 chemistry
 Economics (Page 5)

Question No: 106


AL-JUNAID TECH INSTITUTE
COCOMO is the classic LOC cost-estimation formula and used thousand delivered source instructions
(KDSI) as his of size.

 LOC
 milestone
 unit
 none of given

Question No: 107

deadline is one of the reasons of project failure.

 achievable
 feasible
 unrealistic (Page 29)
 realistic

Question No: 108

model is very sensitive to the risk.

 Spiral (Page 21)


 waterfall
 incremental
 RAD

Question No: 109

is the ability to encourage technical people to produce to their best.

 improvement
 motivation (Page 30)
 innovation
 creation

Question No: 110

Caper Jones is famous researcher in the field of who made a company named Software
Productivity Research

 Biology
 Chemistry
 Mathematics
 Software Engineering (Page 7)
AL-JUNAID TECH INSTITUTE
Question No: 111

In model user feedback is received very quickly because product is delivered in small versions.

 waterfall
 spiral
 incremental (Page 18)
 object oriented

Question No: 112

approach is better for the team spirits point of view.

 Controlled Decentralized
 Informal, interpersonal procedures
 Controlled Centralized
 Democratic Decentralized (Page 32)

Question No: 113

Construction activities are directly related to the _ of the software.

 Installation
 risk analysis
 development (Page 8)
 debugging

Question No: 114

Continuous process improvement is enabled by feedback from the

 analytical , user
 mathematical, user
 logical, process
 qualitative , process (Page 12)

Question No: 115

The major activities related to software construction are

 requirement gathering, design development, coding and testing (Page 8)


 installation and training
AL-JUNAID TECH INSTITUTE
 quality assurance, configuration and planning
 implementation and management

Question No: 116

If requirements are uncertain, will be a suitable.

 Incremental
 RAD
 Waterfall (Page 34)
 Prototype

Question No: 117

Capability maturity model (CMM) is used to judge the _ model of an organization.

 Efficiency
 Performance
 Productivity
 Maturity (Page 12)

Question No: 118

After passing though all the stages of the software development when we deploy the new system at the
user side that stage is called

Integration

Development

Installation

Status quo (Page 11)

Question No: 119

Defects per function points are a metric.

 One (Page 65)


 Two
 Three
 Four

Question No: 120

In Capability Maturity Model (CMM), performs optimization.

 level1
AL-JUNAID TECH INSTITUTE
 level 2
 level3
 level5 (Page 12)

Question No: 121

Defining a |Task Network| helps in defining

 The resources required for project


 Third party tool required for project
 Sequence in which activities will be performed (Page 99)
 None of these

Question No: 122

The first step in project planning is to

 Determine the budget.


 Select a team organizational model.
 Determine the project constraints.
 Establish the objectives and scope. (Page 80)

Question No: 123

Function Point analysis is helpful in calculating the size of the software for _

 Both client and software organization


 Software organization
 Client
 User (Page 38)

Question No: 124

The extent to which a program satisfies its specification and fulfills the customer’s mission objectives is
said to be achieving the

 Usability
 Efficiency
 Reliability
 Correctness

Question No: 125

What activity/activities , we can perform to identify the needs and benefits of a task?

 Establish project statement


 Identify needs and project constraints
AL-JUNAID TECH INSTITUTE
 All of these

Question No:126

BCWS stands for:

 Budgeted cost of whole System


 Budgeted cost of work schedule (Page 102)
 None of the given options

Question No: 127

BCWP refers to:

 Normalized value of budgeted cost


 Overall expected cost of the project (anticipated cost)
 Budgeted cost of work performed so far (Page 102)
 Overall cost of the project (calculated after completion of project)

Question No: 128

Which statement is correct?

 The greater the dependency between the components the greater is coupling
 The lesser the dependency between the components the greater is coupling
 The greater the dependency between the components the lesser is coupling
 None of the given

Question No: 129

In context of moving range and individual control charts, UNPL stands for:
Universal Natural Process Line
Universal Natural Process Limit
Upper Natural Process Limit (Page 77)
Upper Natural Process Line

Question No: 130

Effort required to test a program to ensure that it performs its intended function _

 Testability page (Page 68)


Bug fixing
Debugging
Security

Question No: 131


AL-JUNAID TECH INSTITUTE
The extent to which a program can be expected to perform its intended function with required precision
is called
Usability
Reliability (Page 67)
Portability
Maintainability

Question No: 132

Review is a type of that helps preventing the bugs to move in the next stage of software
development Bug seeding tool

 Filter (Page 109)


 Alarm

Question No: 133

help in finding the matrix to be stable or unstable


Control chart (Page 75)
Directed Graph
Cyclic chart
Base line graph

Question No: 134

Defect Removal Efficiency can be increased by

 By increasing the team member in a team


 Identifying the defect in early stages of development so that it may not be amplified
 Identifying the detect in the later stages of project
 By performing the testing activity only

Question No: 135

give you a better insight into the state of the process or product
Metrics (Page 66)
Efficiency
Reliability
Usability

Question No: 136

Determination of the .................... is a pre-requisite of all sorts of estimates, including, resources, time,
and budget.
AL-JUNAID TECH INSTITUTE
software scope (Page 80)
software Risk
software Quality
software Management

Question No: 137

Following are effective guidelines for Review except

 We need to review the product not the producer


 Be sensitive to personal egos
 Errors should be pointed out gently
 Tone should be high and strict (Page 113)

Question No: 138

Function/Test matrix is a type of


Interim Test report
Final test report
Project status report
Management report

Question No: 139

Poka Yoke is Japanese term and it means

 Mistake Proofing (Page 118)


 Mistake Handling
 Mistake identification
 Mistake assurance

Question No: 140

we need to employ some statistical techniques and plot the result ------------ --. This is known as
statistical control techniques.
Graphically (Page 74)
automatically
manually
personally

Question No: 141

The extent to which a program satisfies its specifications and fulfills the customer’s mission objectives is
AL-JUNAID TECH INSTITUTE
Integrity
Reliability
Correctness (Page 67)
none of given

Question No: 142

Which is not correct in the context of Poka-Yoke technique?

 Simple and cheap


 Sophisticated and expensive (Page 118)
 Part of Process
 Indication point should be near to the place where the problem occurred

Question No: 143

Metrics to assess the quality of the analysis models and the corresponding software specification were
proposed
in 1993- 1999.
Ricado in 1993
Davis in 1990
Davis in 1993 (Page 71)

Question No: 144

If Configuration item identification is not identified, it is possible to control changes and establish
records.

 False (Page 121)


 True

Question No: 145

Incomplete Configuration identification documents may result in:

Defective Product

Higher Maintenance Costs

Schedule Product

Meet Software Quality

A,B,C

B,C,D

A,B,D
AL-JUNAID TECH INSTITUTE
A,B,C,D

Question No: 146

When an Item is baselined, it becomes frozen, here frozen means, that the item can be changed only by
creating an old version

 True (Page 72)


 False

Question No: 147

The most important objective of any engineering activity is to produce high quality product with limited
resources and
Time (Page 66)
Persons
Cost
Metrics

Question No: 148

Extent to which access to software or data by unauthorized persons can be controlled and called

None of given
Efficiency
Reliability
Integrity (Page 67)

Question No: 149

Object un-lock is done by

 check in (Page 125)


 check out
 both check-in and check-out
 none of the given

Question No: 150

Requirements engineering is the basis of the contract between the developer and the client.

 True
 False Written as a contract between client and contractor

Question No: 151


AL-JUNAID TECH INSTITUTE
The amount of computing resources required by a program to perform its function is
Efficiency (Page 67)
Integrity
Reliability
None of given

Question No: 142

Legacy system migration is usually hard. One important reason is that no proper documentation of the
system is available

 True
 False (Page 134)

Question No: 153

While assessing a legacy system for further decision, one should decide the following about the supplier

 Is supplier still in existence?


 Is supplier still in business?
 Is supplier can provide support?
 All of the given (Page 137)

Question No: 154

The application software is assessed on the basis of following factors except

 Documentation
 Understandability
 Code Refactoring (Page 137)
 Test data

Question No: 155

We modify the internal in code re-structuring

 interface
 design (Page 139)
 data structure
 functionality

Question No: 156

technique was initially developed for manufacturing processes in the 1920’s by Walter Shewart.
Upper Control Line
Control chart (Page 75)
AL-JUNAID TECH INSTITUTE
CMP
Quality

Question No: 157

“A method requires lot of information from some other class” is a symptom of bad
smell

 Data clumps
 Lazy class
 Feature envy (Page 143)
 Long Method

Question No: 158

integrates system and software disciplines into single process improvement framework
for introducing new disciplines as needs arise.

 SEI
 CMMI
 CMM
 ISO

Question No: 159

FAST is the abbreviation of

 Facilitated Application Specification Technology


 Facilitated Application Specification Technique (Page 80)
 Facilitated Application Specialization Technique
 None of the above option

Question No: 160

In measuring Software Process Quality by using control charts, if the gap between the defects reported
and defects fixed is increasing, then it means

The product is in unstable condition. (Page 78)


the product is ready for shipment
the product is in stable condition.
None of the above

Question No: 161

Although there are many different models developed by different researchers for estimation, all of them
share which one of the following basic structure
AL-JUNAID TECH INSTITUTE
 E = 3.2 (KLOC)1.05
 E = A + B * (ev)C (Page 81)
 E = [LOC x B0.333/P]3 x (1/t4)
 none of the given

Question No: 162

A is a user recognizable subgroup of data elements within an ILF or EIF

 Record element type (RET) (Page 46)


 Data Element Type
 External Input
 External Query

Question No: 163

This chart is then used to develop the individual control chart is called statistical control techniques.
Yes (Page 77)
No

Question No: 164

Any delay in _ path makes the whole project delayed.

 Logical
 Neural
 Physical
 Critical

Question No: 165

The responsibilities of a Project Manager does not include

 Make a schedule of project


 Allocate tasks to the resources
 Monitoring the tasks
 All these options (Page 28)

Question No: 166

The boundary time defines the following parameter(s) for a project

 the latest time for task initastion before the minimum project completion time is delayed
 The earliest finish
 The latest finish
AL-JUNAID TECH INSTITUTE
 All of the given options (Page 100)

Question No: 167

Quality is the compliance of software to implicit and explicit quality factors. Identify the explicit
requirement from the following:

 Maintainability
 Compliance with CMMI (Page 106)
 Ease of use
 Efficiency

Question No: 168

Following are the benefits of conducting review except

 Help in finding the size of the project


 Helps in verifying the quality of product
 Help in identifying where improvement is required.
 Helps in identifying the bugs in the work product

Question No: 169

Mean Time To Repair (MTTR) is the

 Time when system remained unable for usage


 Time taken to fix the error
 Time taken to repair the software (Page 116)
 All of the given options are correct.

Question No:170

In order to use the Pert and CPM, which one of the following is not required?

 Decomposition of tasks - also known as the work breakdown structure (WBS)


 Teams communication mode detail (Page 100)
 Estimation of effort
 inter dependencies

Question No: 171

SCM is the requirement of the level(s) of CMM

 First Second and later


 Third and later
AL-JUNAID TECH INSTITUTE
 Only Second (Page 119)

Question No:172

We can include following items during configuration item identification

 User Manuals and Documentations


 Source Code
 Software Requirement Specifications
 All of the given choices are correct (Page 120)

Question No: 173

CPM stands for

 critical project Measure


 Critical Path Method (page 100)
 Common Project Measure
 Critical Planning Model

Question No: 174

Software re-factoring is a process in which

 External behavior of the system does not change


 Internal behavior of the system does not change
 Design of the software changes
 Architecture of the software changes

Question No: 175

The Change Control Authority does not have the rights to permit to bring the change in the software

 True
 False (Page 124)

Question No: 176

Check in and check out is actually one and the same process with two different names

 True
 False (Page 124)

Question No: 177

There could be multiple GUIs to satisfy one requirement

 True (Page 37)


AL-JUNAID TECH INSTITUTE
 False

Question No: 178

is the process of Design recovery. At this stage the documentation of the overall
functionality is created.

 Database Engineering
 Reverse Engineering (Page 139)
 Refactoring
 Forward Engineering

Question No: 179

In code restructuring, we do not change the functionality of the code

 True (Page 139)


 False

Question No: 180

Earned Value Analysis (EVA) is a _ technique for assessing the progress of a project.

Select correct option:

 Qualitative
 Quantitative (page 102)
 Subjective
 None of the given options

Question No: 181

A process is “a set of logically related tasks performed to achieve a defined business


outcome”.

 Business (Page 141)


 Software
 CMM
 ISO

Question No: 182

Software Refactoring is a process in which

 External behavior of the system does not change (Page 142)


 Internal behavior of the system does not change
 Design of the software changes
AL-JUNAID TECH INSTITUTE
 Architecture of the software changes

Question No: 183

The formal methods model of software development makes use of mathematical methods to

 define the specification for computer-based systems


 all of the given
 develop defect free computer-based systems
 verify the correctness of computer-based systems

Question No: 184

Which one of the following describes the data and control to be processed, function, performance,
constraints, interfaces, and reliability?

 Product Quality
 Software scope estimation (Page 80)
 Resources requirements
 Time requirements

Question No: 185

A significant SQA plan, among others, should include:

 Resources required for project (Page 177)


 Error tracking procedures
 Phases required in application development process
 None of the given option

Question No: 186

The software plan is not a static document, it is frequently adjusted to make the project appear on track
to meet all deadlines and quality targets.

 True
 False

Question No: 187

The projects are classified into following categories except

 New application development


 Reengineering projects
 Concept development projects
 Marketing Development Projects (Page 96)
AL-JUNAID TECH INSTITUTE
Question No: 188

The processes at ———– is focus on continually improving process performance through both
incremental and innovative technological changes/improvements.

 Level 5
 Level 1
 Level 4
 Level 3

Question No: 189

Quantitative process-improvement objectives for the organization are established, continually revised to
reflect changing business objectives at ————-.

 Level 3
 Level 2
 Level 5
 Level 1

Question No: 190

Reliability of a software is a

 functional requirement
 non-functional requirement
 Design Requirement
 None of the given

Question No: 191

Which of the following is NOT one of the degrees of rigor?

 Casual
 Structured
 Strict
 TSS (Page 66)

Question No: 192

Build and Fix model is a type of software development activity.

 Mathematical
 Perfect
 Haphazard
 Planned
AL-JUNAID TECH INSTITUTE
Question No: 193

Three categories of risks are

 Business risks, personnel risks, budget risks


 Project risks, technical risks, business risks (Page 86)
 Planning risks, technical risks, personnel risks
 Management risks, technical risks, design risks

Question No: 194

MTTC is the abbreviation of

 measured time to change


 mean time to collaborate
 mean time to change (Page 68)
 measure time to cope

Question No: 195

While creating matrix for a set of projects, data should be collected that belongs to a similar domain

 true (Page 72)


 false

Question No: 196

is one of the techniques to prepare project schedule once we have defined "task network"

 Program evaluation and review techniques (PERT) (Page 100)


 Critical Communication path method (CCPM)
 System resource negotiation method (SRNM)
 Strategic Schedule Development technique (SSDT)

Question No: 197

While managing the historical data, we should consider the following except

 Data should be collected only from scientific projects and applications (Page 72)
 Data should be collected from many projects
 Data should be consistent
 Correct data should be taken

Question No: 198

Quality costs may be divided into costs associated with


AL-JUNAID TECH INSTITUTE
 prevention, appraisal, and failure
 people, process, and product
 customers, developers, and maintenance
 all of the given

Question No:199

When a software is delivered to a client and then client reports the bug in it then that bug is termed as

 Error
 Defect
 Mistake
 Fault

Question No: 200

FTR stands for:

 Feasibility of technical requirement


 Fetched Technical Requirement
 Formal Technical Review (Page 109)
 None of the given options

Question No: 201

SQA is an umbrella activity in which following activities are performed EXCEPT

 Review
 Testing
 Project Planning
 Inspection (Page 177)

Question No: 202

Software configuration management is used to

 Manage change in the software (Page 119)


 Mange the financials accounts in an organization
 Manage the administration of company
 All of the given

Question No: 203

Which of the following is not TRUE about "Error Tracking" ?


AL-JUNAID TECH INSTITUTE
 Error tracking can be used to estimate the progress of the project.
 We track errors in work products to assess the status of a project.
 Durint "Error Tracking", we may also need the historical data from similar projects. (Page 104)
 All of the given options.

Question No: 204

SQA is an activity in which testing is performed only

 True
 False (Page 177)

Question No: 205

Schedule Performance Index (SPI) is equal to

 BCWP / BCWS (Page 102)


 BCWP * BCWS
 BCWP + BCWS
 BCWP - BCWS

Question No: 206

BCWS for a task i will be equal to:

 Risks appeared in task i


 Effort (person-days etc) for task I (Page 102)
 Resource deficiency for task i
 None of the given options

Question No: 207

if: E = Errors found before shipment D = Errors found during operation Then Defect Removal Efficiency
(DRE) is equal to:

 DRE = E + (E+D)
 DRE = E - (E+D)
 DRE = E * (E+D)
 DRE = E / (E+D) (Page 104)

Question No: 208

Quality assurance helps management in providing the necessary data about:


AL-JUNAID TECH INSTITUTE
 Product quality (Page 106)
 Errors/bugs left
 Errors/bugs highlighted
 Defect reports

Question No: 209

The progress on a project at any given point in time can be calculated by:

 Adding all the BCWS till that point for all tasks (Page 102)
 Multiplying all the BCWS till that point for all tasks
 Adding BCWS and EVA for all tasks till that point
 None of given options

Question No: 210

The process of rediscovering the software design is called

 Reverse Engineering (Page 139)


 Business Engineering
 Business Process Engineering
 Forward Engineering

Question No: 211

OCI stands for:

 Output, Control and Input


 Overflow of Certain Inputs
 Overflow of Certain Indexes
 None of given options

Question No: 212

A redesigned business process must be prototyped before it is fully integrated into the business.

 False
 True (Page 141)

Question No: 213

Critical path defines:

 The list of the resources that may be needed for future activities.
 The chain of tasks that determines the duration of the project. (Page 100)
 The list of the deficient resources, project is suffering from.
 None of the given options.
AL-JUNAID TECH INSTITUTE
Question No: 214

BAC stands for:

 Budgeted Analysis Cost


 Budget And Cost
 Budget at compilation
 Budget at Completion (Page 102)

Question No: 215

The first task in concept development project is to:

 Determine the cost of the concept


 Determine the resources required for the concept
 Determine the scope of the concept (Page 99)
 Determine the test cases for concept

Question No: 216

Milestone represents:

 A predictable risk that may hit the project


 An unpredictable risk that may hit the project
 The Loss that organization may suffer due to risk
 The defined target which you need to achieve

Question No: 217

Timeline chart is also known as the chart

 Gantt (Page 100)


 PERT
 FREE LANCE
 None of the given

Question No: 218

The more you refine the tasks, the more you can:

 Estimate task with accuracy


 Conclude about scope with accuracy
 Schedule the project with accuracy
 All of the given options

Question No: 219


AL-JUNAID TECH INSTITUTE
In a complex system that will lead to much........... code to write and maintain.

 More (Page 159)


 None of the given
 Less
 Meaningless

Question No: 220

Which of the following is NOT one of the tasks in concept scoping:

 Identify needs and benefits


 Define desired output/control/input
 Define the function/behavior
 Identify the ambiguous requirements (Page 100)

Question No: 1
BCWS is term used in Eamed Value Analysis it stands for _.
► Budgeted Cost of Work Schedule
► Budgeted Cost of Whole System
► Beginning Cost of Whole System
► None of the given options
Question No: 2
states that 80% of the defects can be traced to 20% of its
causes.
► Pareto Principle
► Fred Brooks Principle
► Kraul Principle
► D.Streeter Principle
Question No: 3
AL-JUNAID TECH INSTITUTE
The basic principle for a review is that the focus should be on the
.
► Product and not the producer
► producer and not the Product
► Profit to be gained
► Presentation Slide
Question No: 4
Many defect identified in few components at design level
testing/review, a software development team should _ .
► Allocate good and extra resources at coding level to review these
components thoroughly
► Good achievement by designing team
► No need to allocated further resources at coding level to review
these components
► Mission accomplished once good number of error/flaws identified
level
Question No: 5
Milestone represents:
► The defined target which you need to achieve
► A predicable risk that may hit the project
► A unpredictable risk that may hit the project
► The Loss that organization may suffer due to risk
Question No: 6
a statistical technique is used to develop an overall
indication of improvement in software quality.
► Error index
AL-JUNAID TECH INSTITUTE
► Pareto Principle
► Quality Assurance
► Cost of Quality
Question No: 7
A model where Some errors are passed through to the next stem
undebated such errors are said to have been_ .
► Amplified
► Reduced
► Neutralized
► Multiplexed
Question No: 8
Earned Value Analysis (EVA) is a technique for
assessing the progress of a project.
► Quantitative
► Subjective
► Qualitative
► Descriptive

Question No: 9
It is noted that a/an _ review can be worse than no review
at all.
► Uncontrolled
► Controlled
► Intermediate
► Normal
AL-JUNAID TECH INSTITUTE
Question No: 10
FTR is a quality control activity performed by software enginers.it
stands for:
► Formal Technical Review
► Formatted Technical Review
► Feasibility of Technical Requirement
► Fetched Technical Requirement
Question No: 11
Legacy system migration however is a task and
there are a number of risks involved that need to be mitigated.
► Crucial
► Simple
► Straight-forward
► Easy
Question No: 12
An Engineering Change Order (ECO) defines the change be made,
its constraints and _ .
► Criteria for Review and Audit
► Removal of Change Request
► Approval by change control Board (CCB)
► Approval by Change Control Authority (CCA)
Question No: 13
A system is considered to be a legacy system if it has been in
operation for _ years. A legacy system has many
components.
► Many
► Less then seven
AL-JUNAID TECH INSTITUTE
► More than two
► Less than ten
Question No: 14
A major issue in requirements engineering is the rate at which
requirements change once the requirements phase has
"officially"_ .
► Ended
► Approved
► Deleted
► Started
Question No: 15
The implemented requirement has been through the
selected approach, such as testing or inspection.
► Verified
► Deleted
► Approved
► Ignored
Question No: 16
According to a standish Group report, lack is responsible
for 13% of all project failures,
► User input
► Output
► Resources
► Development Plan
Question No: 17
AL-JUNAID TECH INSTITUTE
is a quality assurance process used to reduce defects by
avoiding or correcting mistakes in early design and development
phases.
► Poka-Yoke
► Software Testing
► Software Change management
► Defect Removal
Question No: 18
According to Clemm, allows the user to specify
alternative forms of the system the selection of a appropriate
versions.
► Configuration Management
► Process Management
► Quality Management
► Cost Management
Question No: 19
is the probability that a program is operating according to
requirements at a given point in time.
► Availability
► Reliability
► Usability
► Security
Question No: 20
enhance the product feature set by replacing a product with
a newer version of the same product.
► Upgrade
► Re-Engineering
AL-JUNAID TECH INSTITUTE
► Update
► Deployment
Question No: 21
The equation to find out the Availability of software is:
► Availability = (MTTF / MTBF) x 100
► Availability = (MTTF / MTBF) / 100
► Availability = (MTTF + MTBF) / 100
► Availability = (MTTF - MTBF) / 100
Question No: 23
The software reengineering is a _ activity.
► Non-trivial
► Code
► Out dated
► Document
Question No: 24
A Software Requirement Specification (SRS) is traced if the
of requirements is clear.
► Origin Page 133
► Quality
► Standard
► Grammar
► Started
Question No: 27
are used by the development as a staging mechanism for
functionality including regular builds.
► Internal releases
AL-JUNAID TECH INSTITUTE
► External releases
► Major releases
► Feature releases
Question No: 28
are mechanisms that lead to prudential quality problem
before it occur or its rapid detection it introduced.
► Mistake-Proofing
► Mistake-Profiling
► Mistake-Provoking
► Mismanagement-Proofing
Question No: 29
Version Control discusses about:
► How does an Organization control changes before and after
installation released to a customer.
► How the resources will be assigned to tasks in work breakdown
structure (WBS).
► How the test cases will be executed before deploying each release.
► How many feature will be included in software.
Question No: 30
Which of the following is NOT one the tasks includes in Software
Configuration Management.
► Test Case development
► Version Control
► Configuration Auditing
► Change Control
Question No: 31
error is most costly to fix.
AL-JUNAID TECH INSTITUTE
► Requirement
► Design
► Implementation
► Testing
Question No: 32
analysis is the first step in the reengineering process.
► Inventory
► Code
► Database
► Document
Question No:32
Change Control process addresses the important question of:
who has the responsibility for approving and ranking changes (Page 121)
Question No: 33
are mechanisms that lead to prevention of potential quality
problem before it occurs or its rapid detection if introduced.
Mistake-Proofing (Page 117)
Question No 34
is an analysis technique which can be used to predict the chain
of events that can cause hazards.
Fault Tree Analysis (Page 117)
Question No 35
The goal of is to manage and control change.
Software Configuration Management (Page 119)
Question No 36
The reliability of a software can be determined by “MTBF” which stands for
.
Mean Time Between Failure (Page 116)
Question No 37
Legacy system migration however is a _ task and there are a
number of risks involved that need to be mitigated.
Easy (Page 134)
AL-JUNAID TECH INSTITUTE
Question No 38
errors are most costly to fix.
Requirement (Page 127)

Question No 39
is a quality assurance process used to reduce defects by avoiding
or correcting mistakes in early design and development phases.
Defect Removal (Page 69)
Question No 40
Poka Yoke is a Japanese term and it means:
Mistake Proofing (Page 118)
Question No 41
A/An is used to fine tune the product by fixing minor product
defects.
Update
Question No 42
is a quality assurance process used to reduce defects by avoiding
or correcting mistakes in early design and development phases.
Defect Removal
Question No 43
are mechanisms that lead to prevention of potential quality
problem before it occurs or its rapid detection if introduced.
Mistake-Proofing (Page 117)
Question No 44
Which of the following is NOT one of the tasks included in Software
Configuration Management:
Test Case development........... Page 121
Question No 45
‘CCB’ decides whether to allow or deny a change request, it stands for
.
Change Control Board ............. Page 124
Question No 46
Mean Time Between Failure (MTBF) can be calculated by .
MTBF=MTTF+MTTR ............. page 116
Question No 47
The goal of is to manage and control change.
AL-JUNAID TECH INSTITUTE
Software Configuration Management ………Page 119
Question No 48
Software configuration management tasks include Identification, Version
Control, Change Control, Configuration Auditing and _ .
Reporting ............ 121
Question No 49
Poka Yoke is the name of a .
Quality Assurance(QA) technique .............. Page 118
Question No 50
Normally the compound number, used for release version numbering, is of
the format:
X.Y.Z
Question No 51
The goal of software development is to develop software on time and
on budget, that meets customers’ real needs.
Quality ……… Page 127
Question No 52
Configuration Status Reporting (CSR) reports on:
A) What happened?
B) Who did it?
C) When did it happen?
D) All of the given options

Question No 53
The information items defined by Engineering Change Order (ECO)
include:
A) Criteria for review and audit
B) Work breakdown structure
C) The project Task Network
D) The change control test case

Question No 54
is one of the techniques to prepare project schedule once we
have defined "task network".
AL-JUNAID TECH INSTITUTE
A) Program evaluation and review techniques (PERT)
B) Critical Communication path method (CCPM)
C) System resource negotiation method (SRNM)
D) Strategic Schedule Development Technique (SSDT)

Question No 55
CPM stands for:
A) Critical Project Measure
B) Critical Path Method
C) Common Project Measure
D) Critical Planning Model

Question No 56
BAC stands for:
A) Budgeted Analysis Cost
B) Budget and Cost
C) Budget at compilation
D) Budget at Completion
Question No 57
The third digit (i.e. "Z") of the release version number format is called:
A) Major Release Number
B) Feature Release Number
C) Defect Repair Number
D) None of the given options

Question No 58
The equation to find out the Avaliability of software is:
A) Avaliability=(MTTF x MTTBF)/100
B) Avaliability=(MTTF / MTTBF)/100
C) Avaliability=(MTTF + MTTBF)/100
D) Avaliability=(MTTF - MTTBF)/100
AL-JUNAID TECH INSTITUTE
Question No 9
Schedule Performance Index (SPI) is equal to:
A) BCWP/BCWS
B) BCWP*BCWS
C) BCWP+BCWS
D) BCWP-BCWS

Question No 60
Following are effective guidelines for Review EXCEPT:
A) We need to review the product not the producer
B) Be sensitive to personal egos
C) Errors should be pointed out gently
D) Tone should be high and strict

Question No 61
The basic idea behind Software configuration management is:
A) To manage and control the change
B) To efficiently allocate the resources
C) To properly manage status reporting
D) None of the given options
Question No 61:

enhances the product feature set by replacing a product with a


newer version of the same product.
 Update
 Deployment
 Re-Enjoining
 Upgrade
Question No 62:
AL-JUNAID TECH INSTITUTE
Which of the following is NOT one of the possible values of “status”
attributes of requirements?
 Verified
 Received
 Approved
 Proposed
Question No 63:
Which of the following the Not one of the attributes of requirements?
 Received by
 Created by
 Creation Date
 Requirements ID
Question No 64:
examine the ways in which failure result in condition that can lead to
mishap.

 Software Usability
 Software Availability
 Software Portability
 Software Safety
Question No 65:
Which of the following is not one of the responsibilities of configuration
Audit team?
 To verify that a FTR has been conducted to assess technical correctness
 To verify that all related DCI’s been properly updated.
 To verify that all the change requests are deleted after implementation
 To verify that DE standards have been properly applied.
Question No 66:
AL-JUNAID TECH INSTITUTE
In a review the should be pointed our gently and the tone should be
loose and constructive.
 Inputs
 Outputs
 Conditions
 Errors
Question No 67:
A Quantitative quality measuring techniques that helps to uncover root cause
for and error and then work on to fix what was traced is called_ _
 Non-Statistical Software Quality Assurance
 Formal Techniques review
 Walkthrough NOT SURE
 Statistical Software Quality Assurances
Question No 68:
A/An is used to fine tune the product by fixing minor product
defects.
 Deployment
 Upgrade
 Enhancement
 Update
Question No 69:
Which of the following is an example of Software Configuration Item (SCI):?

 Reusability
 Test Case and Integration Plan
 Business Plain
 Requirements Plan
Question No 70:

Which of the following is NOT an example of Software Configuration Item (SCI):?

 Test Case
 Test Case and Integration Plan
AL-JUNAID TECH INSTITUTE
 Design specification
 None

Question No 71:
If is not handled properly may create certain problem like
identification and tracking. Version and software delivery related problem.
 Process Implement
 Process Management
 Changes Chaos
 Change documentation
Question No 72:
If the version of a release changes from 1.0.0 to 2.0.0.what will you conclude
about new release(having version 2.0.0)
 There were major changes in functionality
 Bugs in previous functionality was removed
 There were no changes in the functionality
 There were partially change in functionality
Question No 73:
Earned Value Analysis (EVA) is a technique for assessing the progress of a project
 Qualitative
 Quantitative
 Subjective
 None

Question No 74:
The basic idea behind Software configuration management is:
 To manage and control the change
 To efficiently allocate the resources
 To properly manage status reporting
 None
Question No 75:
Following are effective guidelines for Review EXCEPT
 We need to review the product, not the producer
 Be sensitive to personal egos
 Errors should be pointed out gently
 Tone should be high and strict
AL-JUNAID TECH INSTITUTE
Question No 76:
if :
E = Errors found before shipment
D = Errors found during operation
Then Defect Removal Efficiency (DRE) is equal to:
 DRE = E + (E+D)
 DRE = E-(E+D)
 DRE = E*(E+D)
 DRE = E/(E+D)
Question No 77:
In order to use the PERT and CPM, which one of the following is NOT required?
 Decomposition of tasks - also known as the work breakdown structure (WBS)
 Teams communication mode details
 Estimation of effort
 Interdependencies
Question No 74:
If an error related to requirements is identified in testing phase, this error will be
considered as an error of phase
 Requirement
 Design
 Code
 Testing
Question No 75:
Quality cost may be delivered into costs associated with:
 Prevention, appraisal and failure
 Customers, developers and maintenance
 Builds, releases and products
 Bugs, errors and reports
Question No 76:
Poka-Yoke is the name of a
 QA technique
 Japanese dish
 Idiom
 None

Question No 77:
Configuration Auditing deals with:
 Ensuring that Resources have been allocated properly
 Ensuring that changes are implemented parallel with SDLC framework activities
 Ensuring that the changes have been implemented properly
 All of the given
Question No 78:
FTR stands for:
 Feasibility of technical requirement
 Fetched Technical Requirement
AL-JUNAID TECH INSTITUTE
 Formal Technical Review
 None

Question No 79:
A Software Requirement Specification is traced if the of its requirements is clear.
 Quality
 Slandered
 Origin
 None
Question No 80:
Version Control discusses about:
 How does an organization control changes before and after software is released
to a customer
 How the resources will be assigned to tasks in work breakdown structure (WBS)
 How the test cases will be executed before deploying each release.
 All of given

Question No 81:
The implemented requirement has been through the selected approach, such as
testing or inspection.
 Verified
 Deleted
 Approved
 None

Question No 82:
The Software reengineering is a activity.
 Code
 Out dated
 Document
 Non-trivial

Question No 83:
Which of the following is NOT an example of Software Configuration Item (SCI):
 Test Case
 Integration Plan
 Design specification
 None

Question No 84:
Mean Time Between Failure (MTBF) can be calculated by:
 MTBF = MTTF + MTTR
 MTBF = MTTF - MTTR
 MTBF = (MTTF/MTTR)*100 
AL-JUNAID TECH INSTITUTE
 MTBF = (MTTR/MTTF)*100

Question No 85:
software development is itself risky as changes to one part of the system
inevitably involve further changes to other components.
 Forward
 Reverse
 Old
 New
Question No 86:
Program is restructured the reverse engineering phase. In this case we modify
source code and data in order to make it amenable to future changes.
 After
 None
 Along with
 Before

Question No 87:
Managers look at the system from the angle that does the system and associated
business process make an effective contribution to the business goal?
 Senior
 IT
 None
 Line

Question No 88:
user assess the system from the perspective of how effective do they find the
system in supporting their business processes and how much of the system
functionality is used.
 Senior
 IT
 Line
 End
Question No 89:
A system is considered to be a legacy system if it has been in operation for years.
A legacy system has many components.
 Less than seven
 Many
 More than two
 Less than ten
Question No 90:
Legacy system migration, however, is an easy task and there are a number of risks
involved that need to be mitigated
 Simple
AL-JUNAID TECH INSTITUTE
 Crucial
 None
 Easy
Question No 91:
engineering does not simply create a modern equivalent of an older program,
rather new user and technology requirements are integrated into the reengineering
effort
 Forward
 None
 Reverse
 BPR

Question No 92:
Which of the following the NOT one of the attributes of requirements.
 Requirement ID
 Creation Date
 Created By
 Received By
Question No 93:
If the version of a release changes from 1.0.0 to 2.0.0 what will you conclude about
new release (having version 2.0.0)
 There was no change in functionality
 There was major change in functionality
 There was partial change in functionality
 Bugs in previous functionality were removed
Question No 95:
Which of the following is NOT one of the tasks included in Software Configuration
Management.
 Version Control
 Configuration Auditing
 Test Case development
 Change control
AL-JUNAID TECH INSTITUTE

You might also like